Anomalies detection in the application layer with new combined methods in IoT networks

Author(s):  
Adeleh Jafar Gholi Beik ◽  
Mohammad Ebrahim Shiri Ahmad Abadib ◽  
Afshin Rezakhani

Today, due to increasing dependence on the internet, the tendency to make smart and the Internet of things (IoT), has risen. Also, detecting attacks, and malicious activity as well as anomalies on the internet networks, and preventing them from different layers is a necessity. In this method, a new hybrid model of IWC clustering and Random Forest methods are introduced to identify normal and abnormal conditions. It also shows unauthorized access and attacks to different layers of the Internet of Things, especially the application layer. The IWC is a clustering and improved model of the k-means method. After being tested, evaluated, and compared with previous methods, the proposed model indicates that identifying anomalies in, its data has been efficient and useful. Unlabeled data from the Intel data set IBRL is used to cluster its input data. The NSL-KDD data set is also used in the proposed method to select the best classification and identify attacks on the network.

Author(s):  
Dr. Wang Haoxiang

The Internet of things is the basic paradigm with the cluster of techniques that ensure innovations in the service rendered in various applications. It aims to develop a seamless connection between the tangible objects around and the information network in turn to provide a well-structured servicing to its users. Though the IOT service seems to be promising, the risks still prevail in the form of privacy and the security in user acceptance in utilizing the internet of things services, and its application. This makes the trust management very important for the internet of things. So the paper puts forth the distributed block chain involved trust system to manage the conveyance infrastructures of the internet of things paradigm. The evaluation of the proposed model evinces the enhanced security provided for the nodes of the IOT as well as its information exchange.


2021 ◽  
Author(s):  
Mohamad Oubai Al-Rejleh

The Internet of Things (IoT) is a revolutionary concept that emerged in the late 21st century, whereby everyday objects such as household items, cars, and wearables, equipped with sensors and (Radio Frequency Identification) RFID chips, can communicate with the internet and to their physical surroundings. These chips allow the connected items to share information, and allow the user to collect information about his/her “quantified self”, measuring personal data such as habits of usage, lifestyle, and location through internet networks. IoT enabled devices are designed to collect, store, share, and analyze of highly personal data ubiquitously and in real time. However, with this new affordance of connectivity, comes a potential loss of privacy for users, as ever increasing sets of personal data are collected and tracked. As such, there is a pressing need for privacy considerations to be embedded within the early stages of design of connected devices and networks.


Author(s):  
Zelal Gültekin Kutlu

In this study, the periodical differences of industrial revolutions, which is one of the effects of technological developments in the industrial field, and the last stage of it are mentioned. With the latest industrial revolution called Industry 4.0, machines work in harmony with technology at every stage of industrial areas. This period, known as Industry 4.0 or the fourth industrial revolution, refers to the system in which the latest production technologies, automation systems, and the technologies that make up this system exchange data with each other. In addition to the information technologies and automation systems used in Industry 3.0, industrial production has gained a whole new dimension with the use of the internet. With internet networks, machines, operators, and robots now work in harmony. At this point, the concept of internet of objects becomes important. Therefore, another focus of the study is the concept of internet of objects. There are some assumptions about the uses, benefits, and future status of the internet of things.


Author(s):  
Babak Esmaeilpour Ghouchani ◽  
Susan Jodaki ◽  
Maryam Joudaki ◽  
Alireza Balali ◽  
Lila Rajabion

Purpose Nowadays, the Internet of Things (IoT) offers new intelligent services and business model opportunities by extending the internet connectivity into physical devices and daily objects. Recently, this technology has had a deep impact on all the aspects of human societies from industry to management and business. Therefore, the purpose of this paper is to predict the impact of using IoT services on the development of electronic business (e-business). Design/methodology/approach For evaluating the model’s elements, a questionnaire was designed. It was revised by experts with significant experiences. For statistical analysis, SmartPLS 3.2 is used. Findings The findings have confirmed the validity of the proposed model. The results also have indicated that the quality of IoT services (scalability, availability, reliability and ease of use), security of IoT services (trust, reputation, privacy and encryption) and IT knowledge of users (usage skills, awareness, experience and accuracy) have a positive and significant impact on development of e-business. Furthermore, the obtained results have revealed that the operating cost of IoT services (transmission time, storage capacity, functionality and stability) is significantly influenced by the development of e-business. Research limitations/implications By capturing a number of important factors in the proposed model, this study can provide a significant theoretical influence for researchers in the related area of interest. In fact, this study provides a worthwhile direction by assessing e-business performance, which, so far, has not been well assessed in many developing countries. Practical implications From a practical perspective, the statistical results support the crucial role of the following factors: quality of IoT services, the security of IoT services, operating cost of IoT services and IT knowledge of users. Hence, aspects relating to these factors must be the focus of attention of any organization in their endeavor to development of e-business. Originality/value This study meaningfully contributes to the knowledge and literature by focusing more on development e-business and IoT as original technology for further understanding, investigating other important features and applying advanced statistical analyses technique. By doing so, this study was able to develop the current understanding regarding the main aspects of development e-business and IoT services.


Author(s):  
Liangming Cai ◽  
Jingrong Le ◽  
Xuxin Ruan ◽  
Min Du

This paper presents an OSA patient interactive monitoring system based on the Internet of Things (IoT) framework. This system allows OSA patients to get timely rescue when they are sleepy outside. Because the Beidou position marker has an interactive function, it can reduce the anxiety of the patient while waiting for the rescue. At the same time, if a friend helps the OSA patients to call the doctor, the friend can also report the patient's condition in time. This system uses the popular IoT framework. At the bottom is the data acquisition layer, which uses wearable sensors to collect vital signs from patients, with a focus on ECG and SpO2 signals. The middle layer is the network layer that transmits the collected physiological signals to the Beidou indicator using the Bluetooth Low Energy (BLE) protocol. The top layer is the application layer, and the application layer uses the mature rescue interactive platform of Beidou. Since the GPS indicator has not included the communication satellite, So it has no SMS function. OSA patients can only passively wait for a rescue. Moreover, due to the lack of satellites in Asia and the insufficient density of the ground-enhanced system, the positioning error of OSA patients is large. The Beidou system developed by China itself, the main coverage of the satellite is in Asia, and is equipped with a high-density ground-based augmentation system. Therefore, the Beidou model improves the positioning accuracy and is equipped with a special communication satellite, which increases the short message interaction function. Therefore, patients can report disease progression in time while waiting for a rescue. After our simulation test, the effectiveness of the OSA patient rescue monitoring system based on the Internet of Things framework and the positioning accuracy of OSA patients have been greatly improved. Especially when OSA patients work outdoors, the cell phone base station signal coverage is relatively weak. The satellite signal is well covered, plus the SMS function of the Beidou indicator. Therefore, the system can be used to provide timely patient progress and provide data support for the medical rescue team to provide a more accurate rescue plan. After a comparative trial, the rescue rate of OSA patients using the detection device of this system was increased by 15 percentage points compared with the rescue rate using only GPS satellite phones.


Author(s):  
Dr. Mugunthan S. R.

The cyber-attacks nowadays are becoming more and more erudite causing challenges in distinguishing them and confining. These attacks affect the sensitized information’s of the network by penetrating into the network and behaving normally. The paper devises a system for such interference recognition in the internet of things architecture that is aided by the FOG. The proposed system is a combination of variety of classifiers that are founded on the decision tree as well as the rule centered conceptions. The system put forth involves the JRip and the REP tree algorithm to utilize the features of the data set as input and distinguishes between the benign and the malicious traffic in the network and includes an decision forest that is improved with the penalizing attributes of the previous trees in the final stage to classify the traffic in the network utilizing the initial data set as well as the outputs of the classifiers that were engaged in the former stages. The proffered system was examined using the dataset such BOT-Internet of things and the CICIDS2017 to evince its competence in terms of rate of false alarm, detection, and accuracy. The attained results proved that the performance of the proposed system was better compared to the exiting methodologies to recognize the interference.


The internet of things is turning into an appealing framework worldview to acknowledge inter-connections throughout corporeal, digital as well as communal gaps. Through the connections amid the IoT, safety concerns befall important, along with it is huge to set up improved resolutions for safety protections. The IoT apparition of unlock data sharing is expert through using cloud registering concepts. Since IoT is depends on the web, safety concerns of internet will similarly emerge in IoT as well as IoT enclose three layers for example perception, transportation and application layers. The safety concerns, modernism along with solution recognized by the application layer are conversed about in this Paper. The principle focal point of this examination work is on Data Security Protection procedure for application layer


Author(s):  
Dr. Joy Iong Zong Chen ◽  
Dr. Smys S.

Cloud computing is equipped with the numerous of advantageous features to support software and utilities on the Internet of Things (IoT). Cloud-based technology is widely used when offering support for heterogeneous applications integrating specific IoT that follows various semantics. Attaching additional information to raw data sensed with the help of ontology is accomplished in semantic model. The longer distance between the cloud and IoT applications, however, is a bottleneck for vital IoT software. So the paper puts forth a semantic frame work assisted by the fog to enhance the interoperability in the internet of things. The structure put forth moves some of the cloud's commonly used semantic resources sensor networks edge and also offers an effective off-loading technique between fog – fog and fog – cloud devices to diminish total computation time of the task and the energy consumed by the nodes in the fog. The proposed method further follows an efficient mapping technique to transform the data’s sensed into a RDF-format such that it is compatible for processing. The proposed model is evaluated on the basis of delay in the service provision, the energy consumed , and the total cost of the system and further the results obtained are compared with the relevant cloud based computing models , to reveal the proficiency of the proposed.


Author(s):  
Zhihui Wang ◽  
Jingjing Yang ◽  
Benzhen Guo ◽  
Xiao Zhang

At present, the internet of things has no standard system architecture. According to the requirements of universal sensing, reliable transmission, intelligent processing and the realization of human, human and the material, real-time communication between objects and things, the internet needs the open, hierarchical, extensible network architecture as the framework. The sensation equipment safe examination platform supports the platform through the open style scene examination to measure the equipment and provides the movement simulated environment, including each kind of movement and network environment and safety management center, turning on application gateway supports. It examines the knowledge library. Under this inspiration, this article proposes the novel security model based on the sparse neural network and wavelet analysis. The experiment indicates that the proposed model performs better compared with the other state-of-the-art algorithms.


Sign in / Sign up

Export Citation Format

Share Document